googlebot: can I use the thumbnails of external links on a news aggregator website?

I am building a site where I need to publish some news (links) on a specific topic.

I will gather them and add them to my site.

The question is:

Can I use your thumbnail to promote your own links?

For example: (since

enter the description of the image here

Of course, this will be pointed to the specific Link URL for that post and the Source: It will also be displayed.

I will receive news from many sites, not only

Is this legal? Also, how will Googlebot react to this, when it comes to classifying pages?

Printer that sends ARP requests to an external IP address

I connected a printer and a computer to a Wi-Fi network that has no internet, and I used the computer to see the traffic transmitted by the printer. I noticed that the printer is trying to intermittently make ARP requests to (not one, but two) external IP addresses. The network ID part of the IP addresses is the same, while the host ID part of the IP addresses are separated by a number, which seems to be a kind of redundancy or failover structure. The situation with this printer is that, a couple of years ago, I moved and have not used the printer since then. In my old location, I suspect there was some kind of domain controller in the network that installed some type of spyware on any device that connects to the network. The printer model is an Epson XP-410. This printer was also registered with Epson Connect, is there any possibility that the printer that makes ARP requests to an external IP address when registering with Epson Connect is normal? Any other ideas on what's going on?

display – Execution of iMac 2009 on external display due to broken LCD

Yes, it is possible to diagnose and install macOS on an iMac with a broken LCD screen and lack of hard disk.

The all-in-one iMac of that era has a mini screen port for a second screen. It is compatible with Leopard through El Capitan. This is what you will need as a minimum:

  • A mini display port for VGA, DVI or HDMI adapter, depending on the monitor to which it is connected.
  • A bootable USB, either an installer or a USB with a complete installation. You can create an installer by following one of the many guides found online. If you want to use the full installation, you must install macOS on a USB flash memory (64 GB is sufficient) or a USB hard disk.

As for a keyboard, I guess it comes with one, but if it doesn't, you don't need one from Apple; A cheap USB keyboard will work fine. Just remember, the "Windows" and "Alt" keys are the I send Y Option keys, respectively.

networks: connection to NAS through reverse proxy in external VPN

Being behind a 4G-ISP with CGNAT, I cannot connect to my QNAP 269L NAS from the Internet.
I have configured a Raspberry 3B + as a VPN server in a place of friends, with a fast Internet connection.
Could some of you, brilliant people, give me step-by-step instructions on how to configure this, so that I can connect to my NAS from the Internet, through this OpenVPN server (piVPN)?
If I have understood the days in Google well, I need to configure the reverse proxy and some type of port forwarding on the piVPN server, but I have not been able to make anything work.
Thank you very much in advance, Mitscha, Denmark

ssh tunnel: access an http server as a localhost from an external PC through ssh

I have an application server at work that can accept http requests from localhost only.

At home I access the server through ssh.
Once on the server I can curl http://localhost/test.html

I would like to do the same from my web browser at home, that is, somehow redirect my browser traffic through ssh and access test.html as if it were on the server.

I tried ssh -v -D 9090 user@xx.xx.xx.xx and then I configured a manual proxy in Firefox on a SOCKS v5 host: in ip: and port 9090

I see something happens in ssh debugging but it seems that it is not redirecting to server port 80

sharepoint online: how can permissions be managed for all external guests?

I have a question regarding external guests and their permit management. I have created a public website of the SharePoint team and created external guests.

I have the following users, which I can use to obtain permissions:

  • XY website owner
  • WebsiteXY members
  • Any, except external

I would like to map the following authorization structure:

Everyone in my organization and external guests must have read access to the website. Members should be able to participate normally.

But there is no "External" group … the guests are in my "Members of …" group, so I cannot allow the guests to be isolated.

How can I implement this?

authentication: proper way to use oauth with an external authentication server and an API

I have an api server that is based on an authentication server (both owned by the same company). Once the client obtains an authentication server grant, it is no longer necessary, because the only information I need from the authentication server is the user's profile. Should I cache the user profile on the api server, along with the access token? I want to do this so I don't have to keep calling the authentication server every request not related to authentication.

  • The API does not have authentication on its own, trust the authentication server and vice versa.

Is this a good pattern? Or should I issue an access token from the api server, after validating authentication with the authentication server?

enter the description of the image here

laptop – Lenovo IdeaPad G560 BIOS on an external display

I had an accident and the screen of my laptop was completely unusable, the rest of the components work correctly because I connected an external monitor to verify it.

The problem is that I cannot access the BIOS, the external monitor does not show anything until the operating system starts. I already tried the following solutions

  1. Disconnect the flexible cable from the monitor.
  2. Press and hold the fn + f2 / f3 key during startup

Nothing seems to work.

Falsification of server-side requests / External service interaction (DNS)

The application makes DNS requests in the domain name injected in the X-Fordered-For header. Adversaries often use this technique to falsify their IP address. The header also supports host names. Applications that rely on these headers will perform DNS searches to resolve host names provided in IP addresses. This serves as an excellent indicator that the application is vulnerable to IP impersonation attacks, but unless there is a convenient vulnerability of DNS library memory corruption, the callback behavior itself is not exploitable.

Nikon: setting up an SB-700 as an external flash for the D850

I currently have a Nikon D850 along with a SB-700 flash, whose main objective is to shoot cosplays in events. I'm happy that using it on the shoe gets better photos than without it, but I'm still not satisfied. So I would like to experiment to have it off camera.

Now, I have read several ways to fire the flash out of the camera, and I still don't know which one I should use. I want to preserve the HSS and, if possible, the TTL capabilities of the SB-700. I have also read that the D850 has a command mode, but (to my limited knowledge on this subject) it seems that I would need another flash for that.

So I'm thinking of buying a radio trigger / receiver pair, specifically the Godox xPro-N (or X2T-N) and an X1R-N, but would that be the best solution? Or would it be better to buy a second flash for master / commander? Is there any advantage of one of them over the other? Or better yet, is there an integrated way to fire the flash remotely from the D850?